{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T12:10:02Z","timestamp":1750939802947,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615278"},{"type":"electronic","value":"9789819615285"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1528-5_14","type":"book-chapter","created":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T17:24:00Z","timestamp":1739553840000},"page":"204-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Feature Augmented Meta-Learning on\u00a0Domain Generalization for\u00a0Evolving Malware Classification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3888-8167","authenticated-orcid":false,"given":"Fangwei","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5368-918X","authenticated-orcid":false,"given":"Yinhe","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1449-907X","authenticated-orcid":false,"given":"Ruixin","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2532-045X","authenticated-orcid":false,"given":"Qingru","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2054-9215","authenticated-orcid":false,"given":"Changguang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"14_CR1","unstructured":"Malware Statistics [EB\/OL]. https:\/\/portal.av-atlas.org\/malware\/statistics. Accessed 20 May 2024"},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11416-018-0323-0","volume":"15","author":"D Gibert","year":"2019","unstructured":"Gibert, D., Mateu, C., Planes, J., Vicens, R.: Using convolutional neural networks for classification of malware represented as images. J. Comput. Virol. Hack. Tech. 15(2), 15\u201328 (2019)","journal-title":"J. Comput. Virol. Hack. Tech."},{"issue":"103063","key":"14_CR3","first-page":"1","volume":"64","author":"S Kumar","year":"2022","unstructured":"Kumar, S., Janet, B.: Dtmic: deep transfer learning for malware image classification. J. Inform. Secur. Appl. 64(103063), 1\u201318 (2022)","journal-title":"J. Inform. Secur. Appl."},{"issue":"7","key":"14_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jpdc.2022.10.001","volume":"172","author":"F Rustam","year":"2023","unstructured":"Rustam, F., Ashraf, I., Jurcut, A.D., Bashir, A.K., Zikria, Y.B.: Malware detection using image representation of malware data and transfer learning. J. Paral. Dist. Comput. 172(7), 32\u201350 (2023)","journal-title":"J. Paral. Dist. Comput."},{"issue":"11","key":"14_CR5","doi-asserted-by":"publisher","first-page":"4645","DOI":"10.3390\/app14114645","volume":"14","author":"G Alandjani","year":"2024","unstructured":"Alandjani, G.: Securing edge devices: malware classification with dual-attention deep network. Appl. Sci. 14(11), 4645 (2024)","journal-title":"Appl. Sci."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp. 1\u20137 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Ma, Y., Liu, S., Jiang, J., Chen, G., Li, K.: A comprehensive study on learning-based PE malware family classification methods. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1314\u20131325 (2021)","DOI":"10.1145\/3468264.3473925"},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"296","DOI":"10.3390\/sym14020296","volume":"14","author":"F Wang","year":"2022","unstructured":"Wang, F., Chai, G., Li, Q., Wang, C.: An efficient deep unsupervised domain adaptation for unknown malware detection. Symmetry 14(2), 296 (2022)","journal-title":"Symmetry"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Qi, P., Wang, W., Zhu, L., Ng, S.K.: Unsupervised domain adaptation for static malware detection based on gradient boosting trees. In: Proceedings of the 30th ACM International Conference on Information & Knowledge Management, pp. 1457\u20131466 (2021)","DOI":"10.1145\/3459637.3482400"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, Z., Spolaor, R., Yan, Q., Zhao, C., Yang, B.: Dart: detecting unseen malware variants using adaptation regularization transfer learning. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2019)","DOI":"10.1109\/ICC.2019.8761598"},{"issue":"5","key":"14_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103769","volume":"140","author":"S Bhardwaj","year":"2024","unstructured":"Bhardwaj, S., Li, A., Dave, M., Bertino, E.: Overcoming the lack of labeled data: training malware detection models using adversarial domain adaptation. Comput. Secur. 140(5), 103769 (2024)","journal-title":"Comput. Secur."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Rani, N., Mishra, A., Kumar, R., Ghosh, S., Shukla, S.K., Bagade, P.: A generalized unknown malware classification. In: International Conference on Security and Privacy in Communication Systems, pp. 793\u2013806 (2022)","DOI":"10.1007\/978-3-031-25538-0_41"},{"key":"14_CR13","unstructured":"Bosansky, B., Hospodkova, L., Najman, M., Rigaki, M., Babayeva, E., Lisy, V.: Counteracting concept drift by learning with future malware predictions. arXiv preprint arXiv:2404.09352 (2024)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Dietterich T G.: Ensemble methods in machine learning. In: International Workshop on Multiple Classifier Systems, pp. 1\u201315 (2000)","DOI":"10.1007\/3-540-45014-9_1"},{"issue":"3","key":"14_CR15","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1007\/s11263-023-01913-8","volume":"132","author":"K Zhou","year":"2024","unstructured":"Zhou, K., Yang, Y., Qiao, Y., Xiang, T.: Mixstyle neural networks for domain generalization and adaptation. Int. J. Comput. Vis. 132(3), 822\u2013836 (2024)","journal-title":"Int. J. Comput. Vis."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J., Lee, J.Y., Kweon, I.S.: Cbam: convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3\u201319 (2018)","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"14_CR17","unstructured":"Blanchard, G., Lee, G., Scott, C.: Generalizing from several related classification tasks to a new unlabeled sample. In: Advances in Neural Information Processing Systems (NIPS\u201911), pp. 2178\u20132186 (2011)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Li, D., Yang, Y., Song, Y., Hospedales, T.: Learning to generalize: meta-learning for domain generalization. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 11\u201325 (2018)","DOI":"10.1609\/aaai.v32i1.11596"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Shu, Y., Cao, Z., Wang, C., Wang, J., Long, M.: Open domain generalization with domain-augmented meta-learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9624\u20139633 (2021)","DOI":"10.1109\/CVPR46437.2021.00950"},{"issue":"4","key":"14_CR20","doi-asserted-by":"publisher","first-page":"8008","DOI":"10.1109\/TIP.2021.3112012","volume":"30","author":"K Zhou","year":"2021","unstructured":"Zhou, K., Yang, Y., Qiao, Y., Xiang, T.: Domain adaptive ensemble learning. IEEE Trans. Image Proc. 30(4), 8008\u20138018 (2021)","journal-title":"IEEE Trans. Image Proc."},{"key":"14_CR21","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: Mixup: beyond empirical risk minimization. In: International Conference on Learning Representations, pp. 1\u201313 (2018)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Yun, S., Han, D., Oh S.J. , Chun, S., Choe, J., Yoo, Y.: Cutmix: regularization strategy to train strong classifiers with localizable features. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 6023\u20136032 (2019)","DOI":"10.1109\/ICCV.2019.00612"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, K., Yang, Y., Hospedales, T., Xiang, T.: Deep domain-adversarial image generation for domain generalisation. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 13025\u201313032 (2020)","DOI":"10.1609\/aaai.v34i07.7003"},{"key":"14_CR24","unstructured":"Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., Ahmadi, M.: Microsoft malware classification challenge. arXiv preprint arXiv:1802.10135 (2018)"},{"issue":"7","key":"14_CR25","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.neucom.2023.01.053","volume":"528","author":"Y Chen","year":"2023","unstructured":"Chen, Y., et al.: Achieving domain generalization for underwater object detection by domain mixup and contrastive learning. Neurocomputing 528(7), 20\u201334 (2023)","journal-title":"Neurocomputing"},{"issue":"8","key":"14_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103706","volume":"139","author":"Y Jiang","year":"2024","unstructured":"Jiang, Y., Li, G., Li, S., Guo, Y.: Benchmfc: a benchmark dataset for trustworthy malware family classification under concept drift. Comput. Secur. 139(8), 103706 (2024)","journal-title":"Comput. Secur."},{"key":"14_CR27","unstructured":"Krueger, D., et al.: Out-of-distribution generalization via risk extrapolation (rex). In: International Conference on Machine Learning, pp. 5815\u20135826 (2021)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1528-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T11:29:22Z","timestamp":1750937362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1528-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615278","9789819615285"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1528-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}